Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats

Posted on June 21, 2025June 21, 2025 By CWS

DuckDuckGo has considerably upgraded its Rip-off Blocker function to guard customers towards a broader vary of digital threats, together with sham e-commerce platforms, faux cryptocurrency exchanges, and “scareware” ways. 

This enhancement comes as shoppers reported $12.5 billion in fraud losses to the FTC in 2024 alone. 

In contrast to opponents counting on Google’s instruments, DuckDuckGo’s proprietary system processes risk information anonymously through cybersecurity associate Netcraft, making certain no consumer looking information is shared with third events.

Expanded Safety In opposition to Various Scams

The upgraded Rip-off Blocker now targets:

Fraudulent funding/crypto websites: Mimicking official platforms to steal monetary information.

Scareware: Pretend virus alerts pressuring customers into buying bogus safety software program.

Phishing hubs: Impersonating trusted companies to reap login credentials.

Malware distributors: Auto-downloading dangerous information throughout web site visits.

Tracker-powered malicious advertisements: Compromising units through advert networks with out clicks.

These additions handle the 0.1% of unusual threats missed by customary blockers. 

When detecting dangers, DuckDuckGo halts web page masses and shows warnings, permitting secure navigation away from threats.

Nameless Risk Detection Structure

Rip-off Blocker operates by a privacy-centric two-layer system:

Native risk record: Up to date each 20 minutes from Netcraft’s real-time rip-off database, saved straight on units.

Encrypted verification: For uncommon threats (<0.1% incidence), DuckDuckGo servers carry out nameless checks with out third-party information sharing. 

This method contrasts with browsers like Chrome and Safari, which ship consumer information to Google’s Protected Searching service. DuckDuckGo’s resolution requires no accounts and prompts by default throughout its free desktop/cell browsers. 

Privateness Professional subscribers prolong these protections to all system visitors, even when utilizing different browsers through the DuckDuckGo VPN.

The growth underscores DuckDuckGo’s dedication to preemptive privateness: stopping information assortment earlier than it begins, at the same time as scammers evolve their ways. With on-line fraud losses hovering, these enhancements present crucial safeguards towards more and more subtle digital deception.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Blocker, DuckDuckGo, Online, Protect, Rolls, Scam, Threats, Users

Post navigation

Previous Post: How Smart Timesheet Software Is Changing the Way of Work
Next Post: OpenVPN Driver Vulnerability Let Attackers to Crash Windows Systems

Related Posts

Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News
New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
SAP June 2025 Patch Day Cyber Security News
Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News